eheh bravo arrivata mail 1 ora fa
1- SQUIRT PROGRAMMER: CPUKEY NAND RETRIEVAL
Squirt coders just release a nice update in the official XELL GIT repository, the allow to read back the CPU_KEY directly from the NAND. This is a nice small innovation that make sure happy who need to retrieve the CPU_KEY from the CORONA consoles and also from all other consoles.
From today is not anymore necessary to wasting time to connect ETHERNET cable, to find IP of your console and in many case this solve the issue that some corona glitched but aren’t reachable on ETHERNET.
With autoGG update (in release in few hours) and SQUIRTER programmer we made this nice video:
SQUIRTER CPUKEY NAND RETRIEVAL - YouTube
Here you can see squirter that retrieve the CPU KEY without any ETHERNET connection from any console together with autoGG.
Just read the first 1 Mbyte of your nand and the work is done! Simple and fast for all.
Another time we like to improve the RGH for all and all is public without any restriction J
scusate un attimo quindi da come ho capito basta solo il dump della nand per ricavare la cpu key??
vabbè si deve leggere solo il primo mb non di nuovo tutti e 16 mb. E' utile per tutti quelli che si rompono ad usare il cavo ethernet (io xD)
vedo molto piu comoda ricavarla con cavo ethernet sinceramente
Scusa Razor, non avevo visto il post , lo ho rifatto in news !
ragazzi se prima c'èra una sola procedura , per ricavare sta benedetta cpu_key, adesso c'è ne due di procedure meglio no?
Segnalibri